12-22-12: Initial release.
12-23-12: Added prologue text.
Prologue: Guys, the information you will read in this article is just one very specific scenario. There are other benefits than using it to help download corrupted files of “stuff” that you may have stored on your computer downloaded from previous days. Other benefits include faster downloading, resuming capabilities, and low system overhead resources.
So a few days ago, I had a copy of Call of Duty: World at War that I had saved on my external hard drives a few years ago, as my retail disc copy got scratched and unreadable.
As I was getting ready to make a future tutorial for this game, I tried to unzip my RAR files, only to find out that I could not because it was corrupted somehow?
Update 4-5-09: Added another youtube video explaining Utorrent options more in depth.
I love Bittorrent. Bittorrent is an extremely efficient method of using P2P technology to distribute files across the Internet to the masses. This post is not a lesson on the technology behind bittorrent. Instead, I am going to show you what you need and how you can start finding software (among other things) on the Internet. Please note that Bittorrent itself is a legal medium, but the content that you download with Bittorrent may not. This is a tool, and I am not held responsible for how you use it.
Need a Bittorrent client. I recommend utorrent. Find it at www.utorrent.com
Get the latest version. After installing it, it will look like the screen shot below:
Now afterwards you need what is considered a Torrent file. This is a small 1kb file that tells your Bittorrent client how to download the file. If you go to http://www.torrentz.com and search for Ubuntu, you will see many links. I happened to find a link and download it off of mininova.org.
After you add it to your torrent client, the file will start downloading. Once the file finishes downloading, you can then decide what you want to do whether that is install the program, or burn it to a disc.
What is important to achieve faster Bittorrent speeds is to enable the ports on your router. For a good guide on this, go to www.portforward.com and find the utorrent guide for your router.
When you go to the speed guide in Utorrent, you can specify a manual port:
To see a video of this in action, watch my video below for a quick tutorial on how to setup yourself for Bittorrent usage and port forwarding.
Below is another video going into some of the other utorrent options.
The post that gives me the most trouble here on the Underground is everyone asking for an invite code. Almost every frickin’ day someone comes along and asks, “Hey, can you give me an invite?”
Or “How about me too?” After a while, the google spreadsheet was born. In the beginning, I had faith that people had good will and would enter in their names and be done with it.
This worked well, except I quickly realized I had no control. Were there spam bots? How did I know people weren’t just typing in a bunch of fake email address or what? Hence, I decided that I had to control the spreadsheet myself. By having people enter in their requests through the comments, I am able to update the spreadsheet.
How does the Versatile1 system work with invites?
I will tell you how it currently works and what is the process:
1) E-mail people the “test” email. What I do here is I have a pre-written script that I just copy and paste to people. It has very specific instructions in there, and I tell people to respond to me as soon as possible. The e-mail contact is then added to a temporary demonid category list.
2) If people respond, I send them invite. If people don’t respond within a week, I go online to the google spreadsheet and mark them as “EPIC FAIL ACCOUNTS”.
3) For those people who I sent an invite, I ask them if it works. If it does, I add them to the official “Demonoid” category mailing list.
4) Once or twice a month I send out a mass email to the “Demonoid” mailing list asking for invites. It works in a sense I get a crapload of invites. Then I start the circle all over again and sending test emails. If not enough people respond, I have a bunch of expired codes. That is no good!
So now the new method is on the master e-mail list, I ask that people who can generate codes respond to me, but don’t send me any codes yet. I will collect a pool of active participants, and ask them to send me invites one by one.
This way I can distribute invite codes on demand, whithout having to get stuck in a situation where I have more codes on the verge of expiration than participants.
The point of this post is to get feedback from you guys. What do you think is a better method of doing this? Any thoughts? For now the system works fine. I’m cleaning up my mass e-mail list and adding flair to my test email. If there is anything else I should be considering, let me know.
THIS POST IS NOT MEANT FOR COMMENTS ASKING FOR DEMONOID INVITES. GO TO THE OTHER BLOG LINK FOR DEMONOID INVITES, GEEZ.
Marty Friedman -Ex Member of Megadeth
Hello everyone! This week I will reply to this site I found about music piracy, simply titled ‘Music Piracy – Ten Inconvenient Truths.’ I found this on the ‘IFPI’ site, which represents the worldwide recording industry. Here are the 10 inconvenient truths it listed:
1. Pirate Bay, one of the flagships of the anti-copyright movement, makes thousands of euros from advertising on its site, while maintaining its anti-establishment “free music” rhetoric.
2. Allofmp3.com, the well-known Russian website, has not been licensed by a single IFPI member, has been disowned by right holder groups worldwide and is facing criminal proceedings in Russia.
3. Organised criminal gangs and even terrorist groups use the sale of counterfeit CDs to raise revenue and launder money.
4. Illegal file-sharers don’t care whether the copyright infringing work they distribute is from a major or independent label.
5. Reduced revenues for record companies mean less money available to take a risk on “underground” artists and more inclination to invest in “bankers” like American Idol stars.
6. ISPs often advertise music as a benefit of signing up to their service, but facilitate the illegal swapping on copyright infringing music on a grand scale.
7. The anti-copyright movement does not create jobs, exports, tax revenues and economic growth – it largely consists of people pontificating on a commercial world about which they know little.
8. Piracy is not caused by poverty. Professor Zhang of Nanjing University found the Chinese citizens who bought pirate products were mainly middle or higher income earners.
9. Most people know it is wrong to file-share copyright infringing material but won’t stop till the law makes them, according to a recent study by the Australian anti-piracy group MIPI.
10. P2P networks are not hotbeds for discovering new music. It is popular music that is illegally file-shared most frequently.
Now, I wish to to dispute a few of these comments, and add my own. Of course, I have no numbers to back me up, unlike the IFPI, and this is merely my opinion. If I’ve said anything that’s blatantly wrong, let me know in the comments and I’ll take it back. So here are my 10 inconvenient truths:
- (Point 1) The Pirate Bay making money through advertising has little to do with the “free music” it provides/advocates. Advertising companies pay the Pirate Bay for advertising space, and therefore Pirate Bay can afford to provide free stuff. Webcomics such as Ctrl-Alt-Del sell advertising space so they can afford to continue writing their comics and hosting them. The Pirate Bay making money in such a way means that they aren’t making money at anyone’s expense.
- (Point 3) Sure, counterfeit CDs can be sold to make money for criminals. But what money can they possibly make from free file-sharing?
- (Point 5) Reduced revenues for record companies and therefore reduced interest in underground bands just forces these underground bands to find other ways to get in touch with the people which these record companies are further alienating through their brutish attempts to control them. An example is the Arctic Monkeys, who, although now a huge UK band, started off gaining mainstream popularity through MySpace. Underground bands don’t need record companies to get popular if they’re good. ‘Bankers’ do.
- (Point 7) Anti-copyright movements mostly consist of the consumers who are getting more and more fed-up with the methods of organisations such as the RIAA. They may not know much about the economical aspect of the music industry, but they know a lot when it comes down to how their rights are being treated, hence the backlash.
- (Point 10) Anti-piracy campaigners often claim that it is the underground and small bands that suffer, yet how is this true if it is mostly the popular music that is downloaded?
- And if it is the popular bands that receive the most attention from pirates, surely they are also the ones most able to handle it financially?
- The most money a musician or band makes is rarely from album or single sales. Merchandise and Live performances are the true money-makers for most.
- Due to the way the consumer is being alienated by these organisations and record companies, musicians are finding other ways to get in touch, and those that don’t are losing popularity. Look at what happened to Metallica when they took on Napster. And now look at bands such as Nine Inch Nails and Radiohead, who are finding new ways to bring their music to the masses.
- Record companies and copyright organisations are, on the whole, still not realising the potential that the Internet provides financially, and therefore, rather than embracing it, they are trying to fight against something which is impossible to control. Again leading to the alienation of the consumer.
- The customer is always right 😉
Yeah, that’s all. Again, if I’ve made an incorrect claim, let me know. I have no agenda, just playing devil’s advocate 🙂
Rock on! \m/
12-14-09: Cleaned up the entire demonoid form, and wrote a fresh new intro.
Note: Welcome Afterdawn users! Thanks for seeing the link, and if you have friends or you are just looking for a demonoid invite, you have come to the right place! ~ Versatile
Demonid is back, and what better way to celebrate it than to restart the entire Demonoid invite ring?
How does it work?
I have suffered so much in the past trying to figure out the best way to make this work, and this is the solution. All you need to do is click the google spreadsheet form below, fill out the information, and then follow the instructions on the confirmation page.
If the notes on the confirmation page is so important, why even bother with the form at all? Well, that is a good question. The form is there so I can track from the beginning of time how many people have used this service, and so I can tell you guys how popular this invite ring is.
Also, it helps me figure out who has invites. If there were 1,000 people I have invited over the last year, that means I have at least 1,000 people ready to help me send out invites. Get it?
Enjoy your Demonoid journey! You deserve it, and this is the easiest way for me to help you out, as I have been in your shoes before. Beaten and frustrated, but now you don’t have to suffer. All I ask is just continue to visit the blog. Thanks!
Demonoid has gone down again and again for threats directed to the website. Today however, the threat has been to the hosting company through which Demonoid is renting servers from. The staff at Demonoid has made the home page into the following message:
“The CRIA threatened the company renting the servers to us, and because of this it is not possible to keep the site online. Sorry for the inconvenience and thanks for your understanding.”
I have no idea how long they will be down, but something tells me they will be back in some form. No one can hold down the power of the Underground P2P network!
I just tried running my torrents, and to my surprise, the Demonoid trackers are DOWN. This does not look good for Demonoid.
Now if you’ve been following iPhone news at all, you’ll know that one of the most sorely missing features of Apple’s all-in-one device is built-in GPS for real-time navigation with the GoogleMaps application. However, fear not, for there is now a suitable solution to this problem.
Navizon is a company that offers P2P wireless positioning via cell towers and WiFi connections for devices that are lacking a GPS module. Just last month, they released a version of the application for the iPhone, giving users a viable GPS solution to use in conjunction with GoogleMaps.
An important point to note, however, is that it is not as accurate as true GPS. According to those who have tested it, it can be as far off as a city block, or even fail to give a position at all in more remote areas. [http://iphone.macworld.com]
Despite this, it still has a relatively sleek and easy to use interface, and works well over a WiFi connection. It should suit the needs of a basic user, and is easier and less expensive than buying and carrying around a Bluetooth GPS module.
Do you like to download torrents and have you ever wondered if people can track what you are downloading?
Well, heres the deal. Yes, you CAN be tracked. Just as well, companies can ping you can slow down your download speeds a LOT.
“PeerGuardian 2 is Phoenix Labs’ premier IP blocker for Windows. PeerGuardian 2 integrates support for multiple lists, list editing, automatic updates, and blocking all of IPv4 (TCP, UDP, ICMP, etc), making it the safest and easiest way to protect your privacy on P2P.” ~Phoenix Labs
PeerGuardian blocks these ips and helps keep your computer safe from prying eyes. Doing some research, we found a bit of information on PG2
“Peerguardian works by blocking ranges of IP’s which are known to be unsafe. Depending on what you see, either they are trying to make a connection to you or you are trying to make a connection to them. It protects in ranges of P2P (addresses not good for P2P since they are logged or they are RIAA/MPAA spy IP’s) and other such as Ads etc. It is usually them trying to get into your computer because you have something they want, or maybe you’re connecting to them to try and get something. But whatever is blocked, is best blocked just for safety sake. note that if you are using filesharing – it is allowing people to get in to get files (that’s the point of filesharing) or if you are viewing websites you are making physical connections to toher computers. Peerguardian displays SOCKET OPENS – meaning that a connection was attempted. I don’t believe they are cracking in unless you are doing nothing wile being attacked, and it is against most rules – hence illegal. I don’t think the US Navy is trying to get into your computer as such – maybe one of their computers have been hacked and being used as a relay or an employee is using it to hack – or someone not them is using their IP range. Even people in these gov’t IP ranges have been caught sharing. And no, I don’t think they are doing it for evidence in this case, but say BT users or Kazaa or anything else users, it is them (dangerous RIAA) initiating a connection to you in a perfectly legal manner because that’s what the software does – let people in. ANd you agreed to it on installation. Better yet, it goes the other way too – you make a connection to them to try and download and ur caught red handed.” ~ CD Freaks Forum
Peer Guardian is really effective, but only as effective as the blocklists. if some IP gets onto the list and it’s NOT a bad IP, then Peer Guardian actually HINDERS you. But for the most part it works very well. This is most noticeable when trying to use specific P2P programs like LimeWire or Xfire. (xfire tends to send pings back and forth from its internal servers and gaming servers as well as people on your friends list. LimeWire is a similiar case but this time other people are trying to connect to you). Don’t try to game online while using PG, you will not be able to connect unless you unblock the correct ips.
So, where do you go to get peerguardian? And does it cost anything?
Well, its open source, hence FREE.
for downloads, go to: